2024-12-08 03:06:42 +00:00

449 lines
16 KiB
JSON

{
"id": "CVE-2008-3271",
"sourceIdentifier": "secalert@redhat.com",
"published": "2008-10-13T20:00:02.057",
"lastModified": "2024-11-21T00:48:51.353",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Tomcat 5.5.0 and 4.1.0 through 4.1.31 allows remote attackers to bypass an IP address restriction and obtain sensitive information via a request that is processed concurrently with another request but in a different thread, leading to an instance-variable overwrite associated with a \"synchronization problem\" and lack of thread safety, and related to RemoteFilterValve, RemoteAddrValve, and RemoteHostValve."
},
{
"lang": "es",
"value": "Apache Tomcat 5.5.0 y 4.1.0 hasta la 4.1.31 permite a atacantes remotos eludir una restricci\u00f3n de direcci\u00f3n IP y obtener informaci\u00f3n sensible a trav\u00e9s de una solicitud \r\nque se tramita simult\u00e1neamente con otra petici\u00f3n, pero en otro hilo, lo que lleva a una sobreescritura de una variable de instancia asociada con un \"problema de sincronizaci\u00f3n\" y con un fallo de seguridad en la implementaci\u00f3n de los hilos, relacionada con RemoteFilterValve, RemoteAddrValve, y RemoteHostValve."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"baseScore": 4.3,
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-264"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E300013-0CE7-4313-A553-74A6A247B3E9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E08D7414-8D0C-45D6-8E87-679DF0201D55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AB15C5DB-0DBE-4DAD-ACBD-FAE23F768D01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "60CFD9CA-1878-4C74-A9BD-5D581736E6B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*",
"matchCriteriaId": "B7E52BE7-5281-4430-8846-E41CF34FC214"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02860646-1D72-4D9A-AE2A-5868C8EDB3AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE4B9B5-9C2E-47E1-9483-88A17264594F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BE92A9B-4B8C-468E-9162-A56ED5313E17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AE21D455-5B38-4B07-8E25-4EE782501EB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B9AE125C-EB8E-4D33-BB64-1E2AEE18BF81"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.9:*:*:*:*:*:*:*",
"matchCriteriaId": "47588ABB-FCE6-478D-BEAD-FC9A0C7D66DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C92F3744-C8F9-4E29-BF1A-25E03A32F2C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.11:*:*:*:*:*:*:*",
"matchCriteriaId": "084B3227-FE22-43E3-AE06-7BB257018690"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F7DDA1D1-1DB2-4FD6-90A6-7DDE2FDD73F4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.13:*:*:*:*:*:*:*",
"matchCriteriaId": "D2BFF1D5-2E34-4A01-83A7-6AA3A112A1B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.14:*:*:*:*:*:*:*",
"matchCriteriaId": "6D536FF4-7582-4351-ABE3-876E20F8E7FE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*",
"matchCriteriaId": "1C03E4C9-34E3-42F7-8B73-D3C595FD7EE1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.16:*:*:*:*:*:*:*",
"matchCriteriaId": "FB43F47F-5BF9-43A0-BF0E-451B4A8F7137"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.17:*:*:*:*:*:*:*",
"matchCriteriaId": "DFFFE700-AAFE-4F5B-B0E2-C3DA76DE492D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.18:*:*:*:*:*:*:*",
"matchCriteriaId": "11DDD82E-5D83-4581-B2F3-F12655BBF817"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.19:*:*:*:*:*:*:*",
"matchCriteriaId": "8A0F0C91-171E-421D-BE86-11567DEFC7BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.20:*:*:*:*:*:*:*",
"matchCriteriaId": "F22D2621-D305-43CE-B00D-9A7563B061F7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9A5D55E8-D3A3-4784-8AC6-CCB07E470AB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.22:*:*:*:*:*:*:*",
"matchCriteriaId": "7F4245BA-B05C-49DE-B2E0-1E588209ED3B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.23:*:*:*:*:*:*:*",
"matchCriteriaId": "8633532B-9785-4259-8840-B08529E20DCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*",
"matchCriteriaId": "B1D9BD7E-FCC2-404B-A057-1A10997DAFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.25:*:*:*:*:*:*:*",
"matchCriteriaId": "F935ED72-58F4-49C1-BD9F-5473E0B9D8CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.26:*:*:*:*:*:*:*",
"matchCriteriaId": "FADB75DC-8713-4F0C-9F06-30DA6F6EF6B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.27:*:*:*:*:*:*:*",
"matchCriteriaId": "2EA52901-2D16-4F7E-BF5E-780B42A55D6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*",
"matchCriteriaId": "6A79DA2C-35F3-47DE-909B-8D8D1AE111C8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.29:*:*:*:*:*:*:*",
"matchCriteriaId": "8BF6952D-6308-4029-8B63-0BD9C648C60F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.30:*:*:*:*:*:*:*",
"matchCriteriaId": "94941F86-0BBF-4F30-8F13-FB895A11ED69"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*",
"matchCriteriaId": "17522878-4266-432A-859D-C02096C8AC0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EB203AEC-2A94-48CA-A0E0-B5A8EBF028B5"
}
]
}
]
}
],
"references": [
{
"url": "http://jvn.jp/en/jp/JVN30732239/index.html",
"source": "secalert@redhat.com"
},
{
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html",
"source": "secalert@redhat.com"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html",
"source": "secalert@redhat.com"
},
{
"url": "http://secunia.com/advisories/32213",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/32234",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/32398",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35684",
"source": "secalert@redhat.com"
},
{
"url": "http://securityreason.com/securityalert/4396",
"source": "secalert@redhat.com"
},
{
"url": "http://tomcat.apache.org/security-4.html",
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tomcat.apache.org/security-5.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.nec.co.jp/security-info/secinfo/nv09-006.html",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/archive/1/497220/100/0/threaded",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securityfocus.com/bid/31698",
"source": "secalert@redhat.com"
},
{
"url": "http://www.securitytracker.com/id?1021039",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2793",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2800",
"source": "secalert@redhat.com"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1818",
"source": "secalert@redhat.com"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45791",
"source": "secalert@redhat.com"
},
{
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=25835",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
},
{
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E",
"source": "secalert@redhat.com"
},
{
"url": "http://jvn.jp/en/jp/JVN30732239/index.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://jvndb.jvn.jp/en/contents/2008/JVNDB-2008-000069.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://lists.opensuse.org/opensuse-security-announce/2008-10/msg00012.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/32213",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/32234",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/32398",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/35684",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://securityreason.com/securityalert/4396",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://tomcat.apache.org/security-4.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://tomcat.apache.org/security-5.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.fujitsu.com/global/support/software/security/products-f/interstage-200806e.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.nec.co.jp/security-info/secinfo/nv09-006.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/archive/1/497220/100/0/threaded",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/31698",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securitytracker.com/id?1021039",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2793",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2008/2800",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2009/1818",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45791",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=25835",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}